First published: Fri Sep 17 1993(Updated: )
/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | <=4.1.3 | |
Sun SunOS | =4.1.1 | |
Sun SunOS | =4.1.3 | |
Sun SunOS | =4.1.2 | |
Sun SunOS | =4.1.3c | |
<=4.1.3 | ||
=4.1.1 | ||
=4.1.2 | ||
=4.1.3 | ||
=4.1.3c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1318 is considered a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-1999-1318, you should modify the search path for the 'su' command to remove the current working directory (.) or update to a fixed version of SunOS.
CVE-1999-1318 affects all versions of SunOS up to and including 4.1.3.
CVE-1999-1318 is a local privilege escalation vulnerability.
CVE-1999-1318 cannot be exploited remotely as it requires local access to the system.